US20040235480A1 - Equivalent multiple path traffic distribution in communications networks - Google Patents

Equivalent multiple path traffic distribution in communications networks Download PDF

Info

Publication number
US20040235480A1
US20040235480A1 US10/427,938 US42793803A US2004235480A1 US 20040235480 A1 US20040235480 A1 US 20040235480A1 US 42793803 A US42793803 A US 42793803A US 2004235480 A1 US2004235480 A1 US 2004235480A1
Authority
US
United States
Prior art keywords
address
source address
bit values
destination address
individual bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/427,938
Other versions
US7346706B2 (en
Inventor
Ehsan Rezaaifar
Yuri Bassin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Corp
Nokia USA Inc
Original Assignee
Alcatel SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel SA filed Critical Alcatel SA
Priority to US10/427,938 priority Critical patent/US7346706B2/en
Assigned to ALCATEL reassignment ALCATEL ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BASSIN, YURI, REZAAIFAR, EHSAN
Priority to EP04300256.7A priority patent/EP1482695B1/en
Publication of US20040235480A1 publication Critical patent/US20040235480A1/en
Application granted granted Critical
Publication of US7346706B2 publication Critical patent/US7346706B2/en
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG SECURITY AGREEMENT Assignors: ALCATEL LUCENT
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG
Assigned to CORTLAND CAPITAL MARKET SERVICES, LLC reassignment CORTLAND CAPITAL MARKET SERVICES, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP, LLC
Assigned to NOKIA USA INC. reassignment NOKIA USA INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP LLC
Assigned to PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT SAS, NOKIA SOLUTIONS AND NETWORKS BV, NOKIA TECHNOLOGIES OY
Assigned to NOKIA US HOLDINGS INC. reassignment NOKIA US HOLDINGS INC. ASSIGNMENT AND ASSUMPTION AGREEMENT Assignors: NOKIA USA INC.
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL
Assigned to PROVENANCE ASSET GROUP LLC, PROVENANCE ASSET GROUP HOLDINGS LLC reassignment PROVENANCE ASSET GROUP LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA US HOLDINGS INC.
Assigned to PROVENANCE ASSET GROUP HOLDINGS LLC, PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP HOLDINGS LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CORTLAND CAPITAL MARKETS SERVICES LLC
Assigned to RPX CORPORATION reassignment RPX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP LLC
Assigned to BARINGS FINANCE LLC, AS COLLATERAL AGENT reassignment BARINGS FINANCE LLC, AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: RPX CORPORATION
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath

Definitions

  • the present invention relates generally to the field of networked communications and more particularly, to a method and apparatus for the selection, forwarding and distribution of network traffic across equivalent multiple links, paths or path segments to a desired destination.
  • an equivalent path will signify a link, path or path segment that is considered to have one or more identical or similar transmission attributes to an alternative link, path or path segment.
  • an equivalent path as used herein will denote a link, path or path segment that will produce identical or similar traffic consequences if deployed in substitution for an alternative link, path or path segment.
  • a router or other network node will employ the source and destination addresses of a packet in order to select the next path segment where there exist a number of available ECMP segments towards the relevant destination of the packet.
  • a randomized selection function is provisioned to operate on the source and destination addresses of each packet for the purpose of generating a path pointer that is associated with an available ECMP.
  • the randomized selection function in question is intended to produce a distribution of packed traffic mere or less evenly among multiple ECMP segments at each network node.
  • An example of a randomized function used for path selection is a hashing function or algorithm, as is well known to those skilled in this art. Since such functions or algorithms will make use of the source and destination addresses of each packet in order to achieve path selection, packets associated with the same traffic flow will be forwarded along the same downstream path segment at a given node of the network, thereby preserving packet sequencing. Where packets are associated with different traffic flows, the random nature of hashing functions or algorithms that are employed for path selection will generally promote the desired result of distributing traffic of different flows equally among all available ECMP segments at a given network node.
  • ECMP polarization occurs at the network level with the use of path selection routines such as the hashing functions or algorithms described above.
  • path selection routines such as the hashing functions or algorithms described above.
  • the random nature of hashing functions or algorithms, together with the relative uniqueness of each source and destination address pair for a given traffic flow, should promote the tendency to distribute network traffic evenly among all ECMP segments at each network node along a traffic path.
  • a subsequent node in a network could very well employ the identical hashing function or algorithm as its predecessor. For instance, this may occur where network equipment at two contiguous nodes in a network are provided by the same vendor.
  • a first node may result in the selection of a particular path pointer based upon a specific hashing function or algorithm and address pair.
  • Such a path pointer may be associated with the third ECMP segment among those that are available for selection by the first node.
  • a second node downstream from the said first node may employ the same hashing function or algorithm as the first node. For the same traffic flow as identified by address pair, then, this second node will select the identical path pointer as the first node.
  • network traffic in this example would be forwarded in the same manner on two adjacent nodes of the network. Namely, each of the nodes of this example will generate the same path pointer that will be associated with the respective third ECMP path segment available to the nodes. This will produce a polarized traffic distribution for the two nodes in question. In the extreme, all nodes along a path could potentially exhibit this same behaviour, resulting in polarization across the entire source-to-destination path.
  • a method of selecting one of a plurality of equivalent paths for forwarding a network message from a network node of a communications network comprising the steps of: providing a source address and a destination address for the network message, the source address and the destination address being respectively comprised of individual bit values, the individual bit values having a relative mapping as between the source address and the destination address; decorrelating the relative mapping of individual bit values as between the source address and the destination address to obtain a decorrelated address pair; applying a randomized selection function to the decorrelated address pair, wherein the randomized selection function thereby produces an index which is derived from a relative sequence of bit values pertaining to the decorrelated address pair and for selecting said one of the plurality of equivalent paths by means of the index.
  • a network apparatus for selecting one of a plurality of equivalent paths for forwarding a network message from a network node of a communications network, the apparatus comprising: an address reader for deriving a source address and a destination address of said network message, the source address and the destination address being respectively comprised of individual bit values, the individual bit values having a relative mapping as between the source address and the destination address; a decorrelation device for decorrelating the relative mapping of individual bit values as between the source address and the destination address to obtain a decorrelated address pair, and a randomized selection device for producing an index which is derived from a relative sequence of bit values pertaining to the decorrelated address pair and for selecting said one of the plurality of equivalent paths by means of the index.
  • FIG. 1 is a schematic diagram of a communications network within which embodiments of the present invention may be deployed;
  • FIG. 2 is a process diagram illustrating the prior art method of equivalent path segment selection using a path selection randomization algorithm such as a hashing function;
  • FIG. 3 is a process diagram illustrating equivalent path segment selection according to an embodiment of the present invention.
  • FIG. 4 depicts a source address and a destination address for which decorrelation of the respective bit values thereof is performed in accordance with an embodiment of the present invention.
  • FIG. 5 is a system block diagram which illustrates an exemplary network router according to an embodiment of the present invention.
  • the present invention may be deployed as shown in FIG. 1 within a communications network 100 , for instance a network operating according to connectionless forwarding protocols.
  • a connectionless forwarding protocol may be one that is compliant with Internet Protocol (IP) addressing standards.
  • IP Internet Protocol
  • Communications network 100 has nodes 110 , 112 and 114 , together with a backbone cloud 115 .
  • FIG. 2 there is shown schematically the process as known in this art of hashing a source address 2 (denoted “S”) and a destination address 4 (denoted “D”) by way of a hashing algorithm or function 6 so as to generate a path index 8 (denoted “i p ”).
  • the source and destination addresses 2 , 4 may for instance be extracted from the header 9 of a network message or other datagram, such as an IP packet 10 .
  • the path segment index 8 as generated by the hashing algorithm or function 6 , is utilized for the selection of an available message path segment 12 .
  • message path segment 12 may be an equivalent path segment (such as the message path denoted “P 5 ”) chosen from one of a plurality of equivalent path segments (denoted as the message paths “P 1 ” to “P n ”) found on a forwarding table 14 that is associated with a given node of communications network 100 , such as node 110 .
  • the path segment index 8 points to a specific equivalent path segment of forwarding table 14 .
  • a hashing function or algorithm 6 is provided herein, those skilled in the art will appreciate that other suitable path selection randomization functions or algorithms may form part of prior art knowledge, and comprise any randomized selection function which operates on the source address and destination address of a network message to generate an index or other numerical pointer for the selection of available equivalent paths.
  • each of nodes 110 , 112 and 114 are assumed to be sourced from the same equipment vendor and therefore each adopt the same path segment selection methodology for forwarding network traffic.
  • Node 110 presents downstream equivalent path segments 116 and 118 .
  • Node 112 possesses downstream equivalent path segments 120 and 122 , with Node 114 having downstream equivalent path segments 124 and 126 .
  • source addresses 2 comprise the addresses “a”, “b” and “c”
  • destination addresses 4 comprise the addresses “x”, “y” and “z”.
  • the selected path segments for IP packets 10 having the source address “a” and the destination address “x” will exhibit a polarization of the network traffic emanating from those same nodes.
  • Other nodes (not shown) downstream of the nodes 112 and 114 will in the same manner as previously described produce a similar polarized traffic distribution behaviour.
  • the method according to the present invention involves the addition of a preprocessing step as at 5 which operates on at least one of the source address 2 and destination address 4 prior to introducing same to a randomized selection function such as the hashing function 6 .
  • Randomized selection functions as known in this art operate to produce an index for path selection which is derived from a relative sequence of bits as between a source address and a destination address.
  • the preprocessing step 5 decorrelates the relative mapping of bits as between the source address 2 and destination address 4 (again denoted as “S” and “D”, respectively), and this is shown schematically by the respective decorrelation functions 5 a and 5 b.
  • the decorrelation functions 5 a and 5 b respectively produce a decorrelated address pair comprising source address 20 and destination address 24 (each denoted respectively as S d and D d ).
  • the decorrelated address pair then substituted for the source address 2 and the destination address 4 as the expected inputs to the hashing function 6 .
  • the hashing function 6 then operates as per the prior art to generate a path segment index 8 which in turn is utilized as a pointer to the forwarding table 14 that contains all available equivalent path segments for the particular network node for which path segment selection is talking place.
  • the decorrelated address pair need no longer utilized, since the addressing protocol of the network 100 will make use of unaltered source address 2 and destination address 4 for traffic forwarding purposes downstream of the node for which path segment selection has already taken place.
  • decorrelation of the source address 2 and the destination address 4 can be achieved by any function which operates on the bit values associated with at least one of the said addresses so that the relative sequencing, positional interrelation or positional mapping of bits as between the source address 2 and the destination address 4 is varied.
  • the foregoing may moreover be accomplished while retaining the sum of the individual bits associated with each such address.
  • this may be achieved by way of a predetermined shuffling or predetermined scrambling of the bit values of at least one of the source address 2 and destination address 4 , so as to achieve the desired change in the relative positions of bits therebetween.
  • the decorrelation of bit values as aforesaid may be associated with one or more decorrelation parameters that can be randomly assigned for each node of a communications network 100 .
  • Such decorrelation parameters may therefore be node-specific. This is intended to increase the likelihood that the individual hashing functions 6 associated with each node along a source-to-destination path in a network will not operate on the identical decorrelated pair of source and destination addresses, thereby avoiding the likelihood of traffic polarization.
  • FIG. 4 there is shown an embodiment of the present invention whereby the decorrelation of the source address 2 and destination address 4 is achieved by way of bit rotation.
  • a 32-bit source address 40 and a 32-bit destination address 42 in accordance with the IP v4 addressing scheme known to those in this art.
  • the bits comprised in the source address 40 are shown as being rotated in a notional clockwise direction as at 44 .
  • the number of bits so rotated may be defined by a decorrelation parameter in the nature of a rotation parameter 48 (denoted “j”).
  • a second decorrelation parameter in the nature of a rotation parameter 50 may be employed to define such rotation in respect of the destination address 42 .
  • rotation of the bits comprised in the destination address 42 may be executed in a direction opposite to that employed in respect of the source address 40 , for instance in the notional counterclockwise direction at 46 .
  • the rotation parameters 48 and 50 may each comprise a 4-bit value. This is to reflect a numerical value which may produce up to 16 bits of possible rotation in either of the source address 40 and destination address 44 , namely one-half of the length of the 32-bit addresses in question. Where the rotation parameters are defined to have a numerical value that does not exceed one-half of the address length as aforesaid, and the bit rotation in question operates in opposite directions as previously explained, the sought after decorrelation of bits as between the source address 40 and the destination address 44 is enhanced.
  • Each of the rotation parameters 48 and 50 may be assigned a value at node initialization, for instance by way of random generation. Such random generation may employ a timestamp as a mathematical seed for the derivation of the values of the rotation parameters 48 , 50 .
  • the network router 51 may comprise an address reader 52 for reading at least one of the respective bit values of the source address 2 and destination address 4 from a header 9 of a network message such as an IP packet 10 .
  • the address reader 52 may derive its address information as at 70 from network messages that are stored in a memory which is configured as a downstream message buffer 53 .
  • the network message in question maybe network message 85 that is located at head of queue within the downstream message buffer 53 .
  • the downstream message buffer 53 may be provisioned locally of address reader 52 or if desired, may form part of the ingress buffering for the router 51 .
  • Downstream message buffer 53 receives its input of network messages as at 71 and produces its output thereof as at 73 , from which output the address reader derives its address information as aforesaid.
  • the output of downstream message buffer 53 may be directed as at 73 towards the forwarding functions (not shown) of the network router 51 , as well known to this art.
  • One or both of the bit values of the source address 2 and destination address 4 may be input from the address reader 52 as at 74 to an associated decorrelation unit 54 .
  • Each decorrelation unit 54 serves to operate on the bit values associated with the said addresses so that the relative mapping of bits as between the source address 2 and destination address 4 is decorrelated.
  • the decorrelation as aforesaid may be achieved by way of varying the relative sequencing, positional interrelation or positional mapping of bits between the source address 2 and the destination address 4 . Moreover, this may be performed while retaining the sum of the individual bits associated with each such address.
  • a single decorrelation unit 54 may be provided in the network router 51 for processing the bit values associated with the applicable address.
  • two decorrelation units 54 may be provisioned as illustrated.
  • the decorrelation of the source address 2 and destination address 4 is achieved by way of bit rotation.
  • bit rotation is the desired mechanism according to which the decorrelation units 54 operate
  • the decorrelation units 54 may be implemented in hardware using shift registers or the like. This will enable the decorrelation algorithms previously described to be executed relatively quickly, for instance at the line rate of the router 51 .
  • Parameter registers 56 or the like may be utilized to store the current value of the decorrelation parameters previously described, such as the respective rotation parameters 48 , 50 .
  • One such parameter register 56 is assigned to each of the decorrelation units 54 .
  • Each parameter register 56 furnishes to its respective decorrelation unit 54 as at 75 the value of the decorrelation parameter stored therein.
  • the rotation parameters 48 , 50 these parameters are utilized to define the extent of bit rotation that will be executed by each of the respective decorrelation units 54 .
  • the values of the rotation parameters 48 , 50 or of any other decorrelation parameter may be furnished for instance to the parameter registers 56 by a random number generator 58 that is operatively connected thereto as at 57 .
  • a random number generator 58 may service each of the parameter resister 56 .
  • each random number generator 58 will receive such timestamp information as at 77 from a clock unit 60 or the like. Again, although two such clock units 60 have been illustrated, one being provisioned for each of the random number generators 58 , those skilled in this field of art will understand that a single clock unit will suffice for this purpose.
  • refresh values for decorrelation parameters may be generated by or supplied to the affected network node in replacement of the values earlier assigned to the node.
  • the random number generators may be provided with external signal triggers 62 or the like in order to initiate the generation of new correlation parameters for storage in the parameter registers 56 and in turn for use by the decorrelation units 54 .
  • the random number generators 58 may be called upon to generate appropriate refresh values by a signal generated as at 79 at predetermined and selectable intervals by means of a programmable periodic trigger unit 64 or the like, provisioned either for each random number generator 56 as illustrated or by means of a single such unit. The latter alternative would be deployed where it is desired to implement the refresh provision of decorrelation parameters at predetermined intervals, as previously described.
  • the exemplary router 51 further provides a path selection randomization such as a hashing unit 66 or the like, as well known in this art.
  • a path selection randomization such as a hashing unit 66 or the like, as well known in this art.
  • a decorrelated address pair is produced as referred to above.
  • the decorrelation address pair comprises source address 20 and destination address 24 , which are input to the hashing unit 66 as at 68 .
  • the hashing unit 66 then operates as per the prior art to generate a path segment index 8 as at 81 which in turn is utilized as a pointer to a memory 72 or the like which implements the forwarding table 14 that was earlier described.
  • the decorrelated address pair need no longer be utilized by the network router 51 , since the addressing protocol of the network 100 will make use of the unaltered source address 2 and destination address 4 for traffic forwarding purposes downstream of the node for which path segment selection has already taken place.
  • the selected message path segment 12 is then utilized by the network router 51 in order to forward the network message 85 .
  • the present invention thus generally seeks to address the occurrence of network polarization in communications networks, particularly those operating according to connectionless forwarding protocols. This is achieved by providing a method and apparatus for distributing network traffic across equivalent path segments in a communications network. Where such network polarization can be avoided or reduced in its prevalence, network traffic congestion may at times be minimized by a more effective utilization of network resources. Moreover, network resources can be expected to be utilized more cost effectively in those instances where network traffic is found to be more evenly distributed according to the teachings of the present invention. While it is desirable to implement the teachings of the present invention to all network nodes residing in a given network configuration, the presumed benefits of the invention may potentially be felt even in networks where less than all of the network nodes thereof make use of same.
  • nodes or equipment which deploy the apparatus or methods of the present invention may in a sense compensate for the effects of other nodes or equipment which may instead be contributing to the passage of polarized network traffic.
  • the invention also permits a network administrator or other authorized network user to reconfigure network nodes or other network equipment that use the teachings hereof with refresh decorrelation parameters, thereby permitting a response to changes in traffic characteristics, network configuration or other factors that may be causing or contributing to an increase in traffic polarization.

Abstract

A method and associated device for selecting one of a number of equivalent paths in forwarding a network message from a node of a communication network. A source and destination address is provided for the network message. The addresses are formed of individual bit values, and these values have a relative mapping between them. The relative mapping is decorrelated to obtain a decorrelated address pair. A randomized selection function is applied to the decorrelated address pair to produce an index which is derived from the relative sequence of bit values of the decorrelated address paid. The index is then used to select one of the equivalent paths. The associated device provides an address reader, a decorrelation module and a randomized selection module for performing the method previously described.

Description

    FIELD OF THE INVENTION
  • The present invention relates generally to the field of networked communications and more particularly, to a method and apparatus for the selection, forwarding and distribution of network traffic across equivalent multiple links, paths or path segments to a desired destination. [0001]
  • BACKGROUND OF THE INVENTION
  • It is often times desirable in communications networks to attempt to equalize the distribution of traffic across network nodes so as to alleviate network congestion and in order to promote the utilization of network resources as cost-effectively as possible Typically, one will be met with the task of forwarding or distributing network traffic from a source and to a destination across multiple links, paths or path segments that are equivalent or which may be deemed to be equivalent to one another. For instance, such equivalent multiple links, paths or path segments may be characterized by having the same or a comparable cost of transmission to a given destination. As used in this specification, an equivalent path will signify a link, path or path segment that is considered to have one or more identical or similar transmission attributes to an alternative link, path or path segment. Likewise, an equivalent path as used herein will denote a link, path or path segment that will produce identical or similar traffic consequences if deployed in substitution for an alternative link, path or path segment. [0002]
  • In the particular case of networks that employ connectionless network protocols, for example in Internet Protocol (IP) networks, circumstances will routinely arise where traffic must be forwarded to a destination through a network node which possesses equivalent paths known as equal cost multiple paths (ECMPs). One factor which promotes the availability of ECMPs in these networks is that network links, paths or path segments are many times assigned the same default cost by existing forwarding protocols such as Open Shortest Path First (OSPF), Border Gateway Protocol (BGP) or Intermediate System—Intermediate System (ISIS). In forwarding traffic at and from each node within connectionless protocol networks, it therefore becomes a requirement to select among any number of available ECMPs. Such selection must be undertaken while attempting to meet the goals previously mentioned of minimizing network congestion and of promoting an effective utilization of network resources. [0003]
  • To maintain packet ordering in connectionless network protocols, it is desirable for packets belonging to the same flow to be forwarded over the same source-to-destination path. In other words, packets having the same source address and destination address are typically forwarded over the same path so as to preserve packet sequencing. To this end, a router or other network node will employ the source and destination addresses of a packet in order to select the next path segment where there exist a number of available ECMP segments towards the relevant destination of the packet. Typically, a randomized selection function is provisioned to operate on the source and destination addresses of each packet for the purpose of generating a path pointer that is associated with an available ECMP. The randomized selection function in question is intended to produce a distribution of packed traffic mere or less evenly among multiple ECMP segments at each network node. [0004]
  • An example of a randomized function used for path selection is a hashing function or algorithm, as is well known to those skilled in this art. Since such functions or algorithms will make use of the source and destination addresses of each packet in order to achieve path selection, packets associated with the same traffic flow will be forwarded along the same downstream path segment at a given node of the network, thereby preserving packet sequencing. Where packets are associated with different traffic flows, the random nature of hashing functions or algorithms that are employed for path selection will generally promote the desired result of distributing traffic of different flows equally among all available ECMP segments at a given network node. [0005]
  • One phenomenon, known to those in this art as ECMP polarization, occurs at the network level with the use of path selection routines such as the hashing functions or algorithms described above. In theory, the random nature of hashing functions or algorithms, together with the relative uniqueness of each source and destination address pair for a given traffic flow, should promote the tendency to distribute network traffic evenly among all ECMP segments at each network node along a traffic path. In practice, however, a subsequent node in a network could very well employ the identical hashing function or algorithm as its predecessor. For instance, this may occur where network equipment at two contiguous nodes in a network are provided by the same vendor. If an identical hashing function or algorithm is so employed, the use of a given source and destination address pair with the same hashing function or algorithm will result in the selection of an identical path pointer in the subsequent node as was the case with its predecessor. For instance, a first node may result in the selection of a particular path pointer based upon a specific hashing function or algorithm and address pair. Such a path pointer may be associated with the third ECMP segment among those that are available for selection by the first node. A second node downstream from the said first node may employ the same hashing function or algorithm as the first node. For the same traffic flow as identified by address pair, then, this second node will select the identical path pointer as the first node. Once again, this could be associated with the third ECMP segment of those which are available for selection by the second node. As a result, network traffic in this example would be forwarded in the same manner on two adjacent nodes of the network. Namely, each of the nodes of this example will generate the same path pointer that will be associated with the respective third ECMP path segment available to the nodes. This will produce a polarized traffic distribution for the two nodes in question. In the extreme, all nodes along a path could potentially exhibit this same behaviour, resulting in polarization across the entire source-to-destination path. [0006]
  • It has been known to attempt to design network configurations with different hashing functions or algorithm at the nodes thereof as a means of addressing the phenomenon of network polarization. However, this known solution would have the disadvantage that all affected nodes of the network would require different software or hardware to be loaded therewith. This would raise obvious inconvenience for equipment vendors. Another attempted solution may have involved the injection of a mathematical constant or variable within existing hashing functions or algorithms to render them mathematically unique from one another across various nodes within a network. However, those skilled in this art will understand that such an approach would not necessarily resolve the occurrence of traffic polarization, since all such existing hashing algorithms will utilize a source address and a destination address as its expected mathematical inputs, and such known functions or algorithms may very well produce a given repeatable pattern of path selection for the same address pairs notwithstanding the injection of a unique mathematical constant or variable as aforesaid. [0007]
  • It is therefore an object of the present invention to attempt to reduce or alleviate the problem of polarized network traffic distribution where one or more nodes within a communications network possess multiple equivalent path segments for forwarding network traffic. [0008]
  • SUMMARY OF THE INVENTION
  • According to a first broad aspect of the present invention, there is provided a method of selecting one of a plurality of equivalent paths for forwarding a network message from a network node of a communications network, the method comprising the steps of: providing a source address and a destination address for the network message, the source address and the destination address being respectively comprised of individual bit values, the individual bit values having a relative mapping as between the source address and the destination address; decorrelating the relative mapping of individual bit values as between the source address and the destination address to obtain a decorrelated address pair; applying a randomized selection function to the decorrelated address pair, wherein the randomized selection function thereby produces an index which is derived from a relative sequence of bit values pertaining to the decorrelated address pair and for selecting said one of the plurality of equivalent paths by means of the index. [0009]
  • According to a second broad aspect of the present invention, there is provided a network apparatus for selecting one of a plurality of equivalent paths for forwarding a network message from a network node of a communications network, the apparatus comprising: an address reader for deriving a source address and a destination address of said network message, the source address and the destination address being respectively comprised of individual bit values, the individual bit values having a relative mapping as between the source address and the destination address; a decorrelation device for decorrelating the relative mapping of individual bit values as between the source address and the destination address to obtain a decorrelated address pair, and a randomized selection device for producing an index which is derived from a relative sequence of bit values pertaining to the decorrelated address pair and for selecting said one of the plurality of equivalent paths by means of the index.[0010]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • By way of illustration and not of limitation, embodiments of the present invention are next described with reference to the following drawings in which: [0011]
  • FIG. 1 is a schematic diagram of a communications network within which embodiments of the present invention may be deployed; [0012]
  • FIG. 2 is a process diagram illustrating the prior art method of equivalent path segment selection using a path selection randomization algorithm such as a hashing function; [0013]
  • FIG. 3 is a process diagram illustrating equivalent path segment selection according to an embodiment of the present invention; [0014]
  • FIG. 4 depicts a source address and a destination address for which decorrelation of the respective bit values thereof is performed in accordance with an embodiment of the present invention; and [0015]
  • FIG. 5 is a system block diagram which illustrates an exemplary network router according to an embodiment of the present invention.[0016]
  • DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • The present invention may be deployed as shown in FIG. 1 within a [0017] communications network 100, for instance a network operating according to connectionless forwarding protocols. By way of example, a connectionless forwarding protocol may be one that is compliant with Internet Protocol (IP) addressing standards. Communications network 100 has nodes 110, 112 and 114, together with a backbone cloud 115.
  • With reference also to FIG. 2, there is shown schematically the process as known in this art of hashing a source address [0018] 2 (denoted “S”) and a destination address 4 (denoted “D”) by way of a hashing algorithm or function 6 so as to generate a path index 8 (denoted “ip”). The source and destination addresses 2, 4 may for instance be extracted from the header 9 of a network message or other datagram, such as an IP packet 10. The path segment index 8, as generated by the hashing algorithm or function 6, is utilized for the selection of an available message path segment 12. For instance, message path segment 12 may be an equivalent path segment (such as the message path denoted “P5”) chosen from one of a plurality of equivalent path segments (denoted as the message paths “P1” to “Pn”) found on a forwarding table 14 that is associated with a given node of communications network 100, such as node 110. The path segment index 8 points to a specific equivalent path segment of forwarding table 14. Although the specific example of a hashing function or algorithm 6 is provided herein, those skilled in the art will appreciate that other suitable path selection randomization functions or algorithms may form part of prior art knowledge, and comprise any randomized selection function which operates on the source address and destination address of a network message to generate an index or other numerical pointer for the selection of available equivalent paths.
  • It was mentioned previously that where [0019] source addresses 2 and destination addresses 4 are hashed as aforesaid according to known techniques in the art, the problem of network polarization may manifest itself. In FIG. 1, each of nodes 110, 112 and 114 are assumed to be sourced from the same equipment vendor and therefore each adopt the same path segment selection methodology for forwarding network traffic. Node 110 presents downstream equivalent path segments 116 and 118. Node 112 possesses downstream equivalent path segments 120 and 122, with Node 114 having downstream equivalent path segments 124 and 126. In the illustrative example of FIG. 1, source addresses 2 comprise the addresses “a”, “b” and “c”, whereas destination addresses 4 comprise the addresses “x”, “y” and “z”. Where a network message such as an IP packet 10 has the source address “a” and a destination address “x”, it will be assumed by way of example that the path segment selection of node 110 according to the prior art will select path segment 118. Moreover, since the same path segment selection algorithm will be found on each of nodes 112 and 114, these nodes will likewise select respective path segments 122 and 126. In the particular network architecture of the communications network 100, the path segments 122 and 126 are analogous to the path segment 118 as selected by the selection algorithm of node 110. Thus, in each of the nodes 112 and 114, the selected path segments for IP packets 10 having the source address “a” and the destination address “x” will exhibit a polarization of the network traffic emanating from those same nodes. Other nodes (not shown) downstream of the nodes 112 and 114 will in the same manner as previously described produce a similar polarized traffic distribution behaviour.
  • To further emphasize the problem of network polarization with reference to the [0020] communications network 100 of FIG. 1, those skilled in the art will appreciate that if any or all traffic flows that are forwarded to one of the destination addresses x, y or z are directed from node 110 through path segment 118, those same flows will be directed from node 114 through the analogous path segment 126. Likewise, if any or all traffic flows that are forwarded to one of the destination addresses x, y or z are instead directed from node 110 through path segment 116, those same flows will be directed from node 112 through the analogous path segment 120. Thus, the net practical effect of polarized traffic distribution in the example above is that the path segments 122 and 124 will not be utilized for forwarding flows intended for the destination addresses x, y or z.
  • Turning now to FIG. 3, the method according to the present invention involves the addition of a preprocessing step as at [0021] 5 which operates on at least one of the source address 2 and destination address 4 prior to introducing same to a randomized selection function such as the hashing function 6. Randomized selection functions as known in this art operate to produce an index for path selection which is derived from a relative sequence of bits as between a source address and a destination address. In its broad aspect, the preprocessing step 5 decorrelates the relative mapping of bits as between the source address 2 and destination address 4 (again denoted as “S” and “D”, respectively), and this is shown schematically by the respective decorrelation functions 5 a and 5 b. The decorrelation functions 5 a and 5 b respectively produce a decorrelated address pair comprising source address 20 and destination address 24 (each denoted respectively as Sd and Dd). The decorrelated address pair then substituted for the source address 2 and the destination address 4 as the expected inputs to the hashing function 6. The hashing function 6 then operates as per the prior art to generate a path segment index 8 which in turn is utilized as a pointer to the forwarding table 14 that contains all available equivalent path segments for the particular network node for which path segment selection is talking place. Once a path segment has been selected as aforesaid, the decorrelated address pair need no longer utilized, since the addressing protocol of the network 100 will make use of unaltered source address 2 and destination address 4 for traffic forwarding purposes downstream of the node for which path segment selection has already taken place.
  • According to an embodiment of the present invention, decorrelation of the [0022] source address 2 and the destination address 4 can be achieved by any function which operates on the bit values associated with at least one of the said addresses so that the relative sequencing, positional interrelation or positional mapping of bits as between the source address 2 and the destination address 4 is varied. The foregoing may moreover be accomplished while retaining the sum of the individual bits associated with each such address. By way of example, in an embodiment of the present invention, this may be achieved by way of a predetermined shuffling or predetermined scrambling of the bit values of at least one of the source address 2 and destination address 4, so as to achieve the desired change in the relative positions of bits therebetween. Moreover, as explained by way of example below, the decorrelation of bit values as aforesaid may be associated with one or more decorrelation parameters that can be randomly assigned for each node of a communications network 100. Such decorrelation parameters may therefore be node-specific. This is intended to increase the likelihood that the individual hashing functions 6 associated with each node along a source-to-destination path in a network will not operate on the identical decorrelated pair of source and destination addresses, thereby avoiding the likelihood of traffic polarization.
  • With further reference to FIG. 4, there is shown an embodiment of the present invention whereby the decorrelation of the [0023] source address 2 and destination address 4 is achieved by way of bit rotation. By way of example, there is shown a 32-bit source address 40 and a 32-bit destination address 42 in accordance with the IP v4 addressing scheme known to those in this art. The bits comprised in the source address 40 are shown as being rotated in a notional clockwise direction as at 44. The number of bits so rotated may be defined by a decorrelation parameter in the nature of a rotation parameter 48 (denoted “j”). Where it is desired to rotate the bits comprised in the destination address 42 in addition to those of the source address 40, a second decorrelation parameter in the nature of a rotation parameter 50 (denoted “k”) may be employed to define such rotation in respect of the destination address 42. According to an embodiment of the present invention, rotation of the bits comprised in the destination address 42 may be executed in a direction opposite to that employed in respect of the source address 40, for instance in the notional counterclockwise direction at 46.
  • Where 32-bit addressing is encountered, the [0024] rotation parameters 48 and 50 may each comprise a 4-bit value. This is to reflect a numerical value which may produce up to 16 bits of possible rotation in either of the source address 40 and destination address 44, namely one-half of the length of the 32-bit addresses in question. Where the rotation parameters are defined to have a numerical value that does not exceed one-half of the address length as aforesaid, and the bit rotation in question operates in opposite directions as previously explained, the sought after decorrelation of bits as between the source address 40 and the destination address 44 is enhanced. Each of the rotation parameters 48 and 50 may be assigned a value at node initialization, for instance by way of random generation. Such random generation may employ a timestamp as a mathematical seed for the derivation of the values of the rotation parameters 48, 50.
  • Where a 4-bit value is adopted for the [0025] rotation parameters 48, 50 those skilled in this art will appreciate that there may still remain some finite likelihood that a contiguous network node will produce the same path index 8 as its predecessor node, although such likelihood is well reduced when compared to a path segment selection routine where decorrelation of the source and destination addresses does not take place prior to hashing. To account for this possibility that a contiguous network node may produce the same path index as its predecessor node, refresh values for decorrelation parameters may be generated by or supplied to the affected network node in replacement of the values earlier assigned to the node. For instance, this refresh provision of decorrelation parameters can be implemented to take place at predetermined intervals. However, those skilled in this art will understand that refreshing of the decorrelation parameters periodically as aforesaid can be expected to modify traffic forwarding behavior within a network, and should therefore be approached with care. Moreover, where various network nodes are provisioned with such periodic refreshing of decorrelation parameters, it may be advisable to have differing refresh intervals applicable to those nodes so as to decrease the duration over which any nodes may possibly possess the very same refresh parameters. For the foregoing reasons, it would be preferable for the provision of refresh (decorrelation parameters to be undertaken only as required where traffic patterns within a given network configuration are detected to be exhibiting the characteristics of polarization as described previously.
  • With reference now to FIG. 5, there is next described a network apparatus such as a network router [0026] 51 in which an embodiment of the invention is implemented by way of example. The network router 51 may comprise an address reader 52 for reading at least one of the respective bit values of the source address 2 and destination address 4 from a header 9 of a network message such as an IP packet 10. The address reader 52 may derive its address information as at 70 from network messages that are stored in a memory which is configured as a downstream message buffer 53. For instance, the network message in question maybe network message 85 that is located at head of queue within the downstream message buffer 53. The downstream message buffer 53 may be provisioned locally of address reader 52 or if desired, may form part of the ingress buffering for the router 51. Downstream message buffer 53 receives its input of network messages as at 71 and produces its output thereof as at 73, from which output the address reader derives its address information as aforesaid. The output of downstream message buffer 53 may be directed as at 73 towards the forwarding functions (not shown) of the network router 51, as well known to this art.
  • One or both of the bit values of the [0027] source address 2 and destination address 4 may be input from the address reader 52 as at 74 to an associated decorrelation unit 54. Each decorrelation unit 54 serves to operate on the bit values associated with the said addresses so that the relative mapping of bits as between the source address 2 and destination address 4 is decorrelated. According to an embodiment of the present invention, the decorrelation as aforesaid may be achieved by way of varying the relative sequencing, positional interrelation or positional mapping of bits between the source address 2 and the destination address 4. Moreover, this may be performed while retaining the sum of the individual bits associated with each such address. Where it is desired to achieve decorrelation as aforesaid only by operating on the bit values pertaining to one or the other of the source address 2 and destination address 4, a single decorrelation unit 54 may be provided in the network router 51 for processing the bit values associated with the applicable address. Where decorrelation is envisaged by operating on the bit values of both the source address 2 and destination address 4, two decorrelation units 54 may be provisioned as illustrated.
  • in the example according to the present invention discussed earlier, the decorrelation of the [0028] source address 2 and destination address 4 is achieved by way of bit rotation. Where bit rotation is the desired mechanism according to which the decorrelation units 54 operate, the decorrelation units 54 may be implemented in hardware using shift registers or the like. This will enable the decorrelation algorithms previously described to be executed relatively quickly, for instance at the line rate of the router 51. Parameter registers 56 or the like may be utilized to store the current value of the decorrelation parameters previously described, such as the respective rotation parameters 48, 50. One such parameter register 56 is assigned to each of the decorrelation units 54. Each parameter register 56 furnishes to its respective decorrelation unit 54 as at 75 the value of the decorrelation parameter stored therein.
  • As previously explained, in the case of the [0029] rotation parameters 48, 50, these parameters are utilized to define the extent of bit rotation that will be executed by each of the respective decorrelation units 54, The values of the rotation parameters 48, 50 or of any other decorrelation parameter may be furnished for instance to the parameter registers 56 by a random number generator 58 that is operatively connected thereto as at 57. Although two such random number generators 58 are shown in the embodiment illustrated, those skilled in the art will appreciate that a single random number generator 58 may service each of the parameter resister 56. It was mentioned previously that timestamp information may serve as a mathematical seed for random number generation and where this is desired, each random number generator 58 will receive such timestamp information as at 77 from a clock unit 60 or the like. Again, although two such clock units 60 have been illustrated, one being provisioned for each of the random number generators 58, those skilled in this field of art will understand that a single clock unit will suffice for this purpose.
  • As described earlier, refresh values for decorrelation parameters may be generated by or supplied to the affected network node in replacement of the values earlier assigned to the node. Where the refresh values are provided as deemed necessary by a network administrator or other authorized user, the random number generators may be provided with external signal triggers [0030] 62 or the like in order to initiate the generation of new correlation parameters for storage in the parameter registers 56 and in turn for use by the decorrelation units 54. Alternatively, the random number generators 58 may be called upon to generate appropriate refresh values by a signal generated as at 79 at predetermined and selectable intervals by means of a programmable periodic trigger unit 64 or the like, provisioned either for each random number generator 56 as illustrated or by means of a single such unit. The latter alternative would be deployed where it is desired to implement the refresh provision of decorrelation parameters at predetermined intervals, as previously described.
  • The exemplary router [0031] 51 according to an embodiment of the present invention further provides a path selection randomization such as a hashing unit 66 or the like, as well known in this art. Following decorrelation of the source address 2 and destination address 4 by the decorrelation units 54, a decorrelated address pair is produced as referred to above. The decorrelation address pair comprises source address 20 and destination address 24, which are input to the hashing unit 66 as at 68. The hashing unit 66 then operates as per the prior art to generate a path segment index 8 as at 81 which in turn is utilized as a pointer to a memory 72 or the like which implements the forwarding table 14 that was earlier described. As already explained, once a message path segment has been selected as aforesaid, the decorrelated address pair need no longer be utilized by the network router 51, since the addressing protocol of the network 100 will make use of the unaltered source address 2 and destination address 4 for traffic forwarding purposes downstream of the node for which path segment selection has already taken place. The selected message path segment 12 is then utilized by the network router 51 in order to forward the network message 85.
  • The present invention thus generally seeks to address the occurrence of network polarization in communications networks, particularly those operating according to connectionless forwarding protocols. This is achieved by providing a method and apparatus for distributing network traffic across equivalent path segments in a communications network. Where such network polarization can be avoided or reduced in its prevalence, network traffic congestion may at times be minimized by a more effective utilization of network resources. Moreover, network resources can be expected to be utilized more cost effectively in those instances where network traffic is found to be more evenly distributed according to the teachings of the present invention. While it is desirable to implement the teachings of the present invention to all network nodes residing in a given network configuration, the presumed benefits of the invention may potentially be felt even in networks where less than all of the network nodes thereof make use of same. Thus, nodes or equipment which deploy the apparatus or methods of the present invention may in a sense compensate for the effects of other nodes or equipment which may instead be contributing to the passage of polarized network traffic. The invention also permits a network administrator or other authorized network user to reconfigure network nodes or other network equipment that use the teachings hereof with refresh decorrelation parameters, thereby permitting a response to changes in traffic characteristics, network configuration or other factors that may be causing or contributing to an increase in traffic polarization. [0032]
  • Those skilled in this art will understand that various modifications of detail may be made to the method and apparatus according to the present invention, all coming within its spirit and scope. [0033]

Claims (40)

We claim:
1. A method of selecting one of a plurality of equivalent paths for forwarding a network message from a network node of a communications network, the method comprising the steps of:
providing a source address and a destination address for the network message, the source address and the destination address being respectively comprised of individual bit values, the individual bit values having a relative mapping as between the source address and the destination address;
decorrelating the relative mapping of individual bit values as between the source address and the destination address to obtain decorrelated address pair,
applying a randomized selection function to the decorrelated address pair, wherein the randomized selection function thereby produces an index which is derived from a relative sequence of bit values pertaining to the decorrelated address pair; and
selecting said one of the plurality of equivalent paths by means of the index.
2. The method according to claim 1, wherein the said step of decorrelating the relative mapping of individual bit values as between the source address and the destination address comprises modification of a relative sequence of said bit values as between the source address and the destination address.
3. The method according to claim 2, wherein the said step of decorrelating the relative mapping of individual bit values as between the source address and the destination results in preservation of a summed value of each of the individual bit values of the source address and of a summed value of each of the individual bit values of the destination address following said decorrelating.
4. The method according to claim 3, wherein randomized selection function is a hashing function.
5. The method according to claim 2, wherein the said step of decorrelating the relative mapping of individual bit values as between the source address and the destination address is accomplished by scrambling of said individual bit values of at least one of said source address and said destination address.
6. The method according to claim 2, wherein the said step of decorrelating the relative mapping of individual bit values as between the source address and the destination address is accomplished by shuffling of said individual bit values of at least one of said source address and said destination address.
7. The method according to claim 4, wherein the said step of decorrelating the relative mapping of individual bit values as between the source address and the destination address is accomplished by bit rotation of said individual bit values of at least one of said source address and said destination address.
8. The method according to claim 7, wherein the said step of decorrelating the relative mapping of individual bit values as between the source address and the destination address is accomplished by bit rotation of said individual bit values of each of said source address and said destination address.
9. The method according to claim 8, wherein bit rotation of said individual bit values of the source address is performed in a direction of rotation that is opposite to a direction of bit rotation of said individual bit values of the destination address.
10. The method according to claim 9, wherein the bit rotation is performed respectively for a predetermined number of bits in respect of the source address and the destination address, the predetermined number of bits being defined by a bit rotation parameter associated respectively with each of the source address and the destination address.
11. The method according to claim 10, wherein each bit rotation parameter is derived by means of a random number generator.
12. The method according to claim 11, wherein the random number generator employs a timestamp as a mathematical seed therefor.
13. The method according to claim 12, wherein the timestamp is obtained upon initialization of the network node.
14. The method according to claim 13, wherein each bit rotation parameter is re-derived dynamically subsequent to initialization of the network node.
15. The method according to claim 14, wherein each bit rotation parameter is re-derived dynamically based upon a new timestamp from that obtained upon initialization of the network node.
16. The method according to claim 15, wherein the network message is an Internet Protocol packet.
17. The method according to claim 16, wherein the source address and the destination address are each 32 bits in length.
18. The method according to claim 17, wherein the rotation parameters are each 4 bits in length.
19. The method according to claim 18, wherein the predetermined number of bits is in a range of from 1 to 16.
20. The method according to claim 16, wherein the predetermined number of bits is in a range of from 1 to one-half of a total length of the source address.
21. The method according to claim 17, wherein the equivalent paths are equal cost multiple paths.
22. A network apparatus for selecting one of a plurality of equivalent paths for forwarding a network message from a network mode of a communications network, the apparatus comprising:
an address reader for deriving a source address and a destination address of said network message, the source address and the destination address being respectively comprised of individual bit values, the individual bit values having a relative mapping as between the source address and the destination address;
a decorrelation device for decorrelating the relative napping of individual bit values as between the source address and the destination address to obtain a decorrelated address pair; and
a randomized selection device for producing an index which is derived from a relative sequence of bit values pertaining to the decorrelated address pair and for selecting said one of the plurality of equivalent paths by means of the index.
23. The apparatus according to claim 22, wherein the decorrelating unit decorrelates the relative mapping of individual bit values as between the source address and the destination address by modification of a relative sequence of said bit values as between the source address and the destination address.
24. The apparatus according to claim 23, wherein the decorrelation device unit decorrelates the relative mapping of individual bit value as between the source address and the destination while preserving a summed value of each of the individual bit values of the source address and a summed value of each of the individual bit values of the destination address.
25. The apparatus according to claim 24, wherein the randomized selection device executes a hashing function for producing the said index.
26. The apparatus according to claim 24, wherein the decorrelation device unit decorrelates the relative mapping of individual bit values as between the source address and the destination address by scrambling of said individual bit values of at least one of said source address and said destination address.
27. The apparatus according to claim 24, wherein the decorrelation device decorrelates the relative mapping of individual bit values as between the source address and the destination address by shuffling of said individual bit values of at least one of said source address and said destination address.
28. The apparatus according to claim 24, wherein the decorrelation device decorrelates the relative mapping of individual bit values as between the source address and the destination address by bit rotation of said individual bit values of at least one of said source address and said destination address.
29. The network apparatus according to claim 24, further comprising a second decorrelation device, wherein each of the decorrelation devices operates on a respective source address and destination address to obtain the decorrelated address pair.
30. The apparatus according to claim 30, the decorrelation device decorrelates the relative mapping of individual bit values between the source address and the destination address by bit rotation of said individual bit values of each of said source address and said destination address.
31. The apparatus according to claim 30, wherein the bit rotation of said individual bit values of the source address is performed in a direction of rotation that is opposite to a direction of bit rotation of said individual bit values of the destination address.
32. The apparatus according to claim 31, wherein the bit rotation is performed respectively for a predetermined number of bits in respect of each of the source address and the destination address, the predetermined number of bits being defined by a bit rotation parameter associated respectively with each of the source address and the destination address.
33. The apparatus according to claim 32, further comprising two parameter registers for respectively storing each bit rotation parameter.
34. The apparatus according to claim 33, further comprising a random number generator for deriving each bit rotation parameter.
35. The apparatus according to claim 34, wherein the random number generator employs a timestamp as a mathematical seed therefor.
36. The apparatus according to claim 35, wherein the decorrelation units are each implemented as shift registers.
37. The apparatus according to claim 36, further comprising a clock unit for providing the timestamp to the random number generator.
38. The apparatus according to claim 37, wherein the timestamp is provided to the random number generator and the bit rotation parameters are derived therefrom upon initialization of the network node.
39. The apparatus according to claim 38, wherein each bit rotation parameter is re-derived dynamically subsequent to initialization of the network node.
40. The apparatus according to claim 39, wherein each bit rotation parameter is re-derived dynamically based upon a new timestamp from that provided to the random number generator upon initialization of the network node.
US10/427,938 2003-05-02 2003-05-02 Equivalent multiple path traffic distribution in communications networks Active 2026-02-13 US7346706B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/427,938 US7346706B2 (en) 2003-05-02 2003-05-02 Equivalent multiple path traffic distribution in communications networks
EP04300256.7A EP1482695B1 (en) 2003-05-02 2004-05-03 Equivalent multiple path traffic distribution in communications networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/427,938 US7346706B2 (en) 2003-05-02 2003-05-02 Equivalent multiple path traffic distribution in communications networks

Publications (2)

Publication Number Publication Date
US20040235480A1 true US20040235480A1 (en) 2004-11-25
US7346706B2 US7346706B2 (en) 2008-03-18

Family

ID=33131499

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/427,938 Active 2026-02-13 US7346706B2 (en) 2003-05-02 2003-05-02 Equivalent multiple path traffic distribution in communications networks

Country Status (2)

Country Link
US (1) US7346706B2 (en)
EP (1) EP1482695B1 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040264374A1 (en) * 2003-06-27 2004-12-30 Broadcom Corporation Equal and weighted cost multipath load balancing in a network device
US20080240740A1 (en) * 2007-03-29 2008-10-02 Oki Data Corporation Image processing apparatus and image processing system
US20090031032A1 (en) * 2007-07-25 2009-01-29 Cisco Technology, Inc. Register clustering in a sip-based network
US20090282148A1 (en) * 2007-07-18 2009-11-12 Foundry Networks, Inc. Segmented crc design in high speed networks
US20100293327A1 (en) * 2009-05-14 2010-11-18 Brocade Communications Systems, Inc. TCAM Management Approach That Minimize Movements
US20110069711A1 (en) * 2009-09-21 2011-03-24 Brocade Communications Systems, Inc. PROVISIONING SINGLE OR MULTISTAGE NETWORKS USING ETHERNET SERVICE INSTANCES (ESIs)
US20110110237A1 (en) * 2004-03-26 2011-05-12 Foundry Networks, Llc Method and Apparatus for Aggregating Input Data Streams
US8037399B2 (en) 2007-07-18 2011-10-11 Foundry Networks, Llc Techniques for segmented CRC design in high speed networks
US8149839B1 (en) * 2007-09-26 2012-04-03 Foundry Networks, Llc Selection of trunk ports and paths using rotation
US8155011B2 (en) 2007-01-11 2012-04-10 Foundry Networks, Llc Techniques for using dual memory structures for processing failure detection protocol packets
US8170044B2 (en) 2002-05-06 2012-05-01 Foundry Networks, Llc Pipeline method and system for switching packets
US8194666B2 (en) 2002-05-06 2012-06-05 Foundry Networks, Llc Flexible method for processing data packets in a network routing system for enhanced efficiency and monitoring capability
US8238255B2 (en) 2006-11-22 2012-08-07 Foundry Networks, Llc Recovering from failures without impact on data traffic in a shared bus architecture
US20130107717A1 (en) * 2010-07-02 2013-05-02 Huawei Technologies Co., Ltd. Method, apparatus, and system for sharing network traffic
US8448162B2 (en) 2005-12-28 2013-05-21 Foundry Networks, Llc Hitless software upgrades
JP2014017842A (en) * 2007-12-26 2014-01-30 Nortel Networks Ltd Tie-breaking in shortest path determination
US8671219B2 (en) 2002-05-06 2014-03-11 Foundry Networks, Llc Method and apparatus for efficiently processing data packets in a computer network
US8718051B2 (en) 2003-05-15 2014-05-06 Foundry Networks, Llc System and method for high speed packet transmission
US8730961B1 (en) 2004-04-26 2014-05-20 Foundry Networks, Llc System and method for optimizing router lookup
US8964754B2 (en) 2000-11-17 2015-02-24 Foundry Networks, Llc Backplane interface adapter with error control and redundant fabric
US10063407B1 (en) 2016-02-08 2018-08-28 Barefoot Networks, Inc. Identifying and marking failed egress links in data plane
US10084687B1 (en) 2016-11-17 2018-09-25 Barefoot Networks, Inc. Weighted-cost multi-pathing using range lookups
US10237206B1 (en) 2017-03-05 2019-03-19 Barefoot Networks, Inc. Equal cost multiple path group failover for multicast
US10313231B1 (en) * 2016-02-08 2019-06-04 Barefoot Networks, Inc. Resilient hashing for forwarding packets
US10404619B1 (en) 2017-03-05 2019-09-03 Barefoot Networks, Inc. Link aggregation group failover for multicast
CN113542131A (en) * 2021-05-25 2021-10-22 新华三信息安全技术有限公司 Message forwarding method and device

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356030B2 (en) * 2000-11-17 2008-04-08 Foundry Networks, Inc. Network switch cross point
US8000952B2 (en) * 2006-03-09 2011-08-16 International Business Machines Corporation Method and system for generating multiple path application simulations
US7821925B2 (en) * 2007-01-29 2010-10-26 Fulcrum Microsystems, Inc. Traffic distribution techniques utilizing initial and scrambled hash values
US7817571B2 (en) * 2007-02-14 2010-10-19 Cisco Technology, Inc. Automatic discovery of blocking access-list ID and match statements in a network
US9237100B1 (en) 2008-08-06 2016-01-12 Marvell Israel (M.I.S.L.) Ltd. Hash computation for network switches
US8396066B1 (en) * 2008-10-07 2013-03-12 BCK Networks, Inc. Routing table for non-uniform random neighbor selection
CN102273141B (en) * 2009-01-12 2015-09-02 惠普开发有限公司 Reduce the propagation of the message flooding in computer network
US8660005B2 (en) 2010-11-30 2014-02-25 Marvell Israel (M.I.S.L) Ltd. Load balancing hash computation for network switches
US9171030B1 (en) 2012-01-09 2015-10-27 Marvell Israel (M.I.S.L.) Ltd. Exact match lookup in network switch devices
WO2014132136A2 (en) 2013-02-27 2014-09-04 Marvell World Trade Ltd. Efficient longest prefix matching techniques for network devices
US9537771B2 (en) 2013-04-04 2017-01-03 Marvell Israel (M.I.S.L) Ltd. Exact match hash lookup databases in network switch devices
US9906592B1 (en) 2014-03-13 2018-02-27 Marvell Israel (M.I.S.L.) Ltd. Resilient hash computation for load balancing in network switches
US10587516B1 (en) 2014-07-15 2020-03-10 Marvell Israel (M.I.S.L) Ltd. Hash lookup table entry management in a network device
EP3266166B1 (en) 2015-03-06 2021-11-17 Marvell World Trade Ltd. Method and apparatus for load balancing in network switches
US10904150B1 (en) 2016-02-02 2021-01-26 Marvell Israel (M.I.S.L) Ltd. Distributed dynamic load balancing in network systems
US10243857B1 (en) 2016-09-09 2019-03-26 Marvell Israel (M.I.S.L) Ltd. Method and apparatus for multipath group updates
CN110768917B (en) * 2019-10-31 2021-09-21 杭州迪普科技股份有限公司 Message transmission method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5596722A (en) * 1995-04-03 1997-01-21 Motorola, Inc. Packet routing system and method for achieving uniform link usage and minimizing link load
US5596719A (en) * 1993-06-28 1997-01-21 Lucent Technologies Inc. Method and apparatus for routing and link metric assignment in shortest path networks
US6363319B1 (en) * 1999-08-31 2002-03-26 Nortel Networks Limited Constraint-based route selection using biased cost
US6721800B1 (en) * 2000-04-10 2004-04-13 International Business Machines Corporation System using weighted next hop option in routing table to include probability of routing a packet for providing equal cost multipath forwarding packets
US6834310B2 (en) * 1998-10-30 2004-12-21 Science Applications International Corp. Preventing packet flooding of a computer on a computer network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6438133B1 (en) * 1998-09-09 2002-08-20 Cisco Technology, Inc. Load balancing mechanism for a translational bridge environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5596719A (en) * 1993-06-28 1997-01-21 Lucent Technologies Inc. Method and apparatus for routing and link metric assignment in shortest path networks
US5596722A (en) * 1995-04-03 1997-01-21 Motorola, Inc. Packet routing system and method for achieving uniform link usage and minimizing link load
US6834310B2 (en) * 1998-10-30 2004-12-21 Science Applications International Corp. Preventing packet flooding of a computer on a computer network
US6363319B1 (en) * 1999-08-31 2002-03-26 Nortel Networks Limited Constraint-based route selection using biased cost
US6721800B1 (en) * 2000-04-10 2004-04-13 International Business Machines Corporation System using weighted next hop option in routing table to include probability of routing a packet for providing equal cost multipath forwarding packets

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8964754B2 (en) 2000-11-17 2015-02-24 Foundry Networks, Llc Backplane interface adapter with error control and redundant fabric
US8671219B2 (en) 2002-05-06 2014-03-11 Foundry Networks, Llc Method and apparatus for efficiently processing data packets in a computer network
US8989202B2 (en) 2002-05-06 2015-03-24 Foundry Networks, Llc Pipeline method and system for switching packets
US8194666B2 (en) 2002-05-06 2012-06-05 Foundry Networks, Llc Flexible method for processing data packets in a network routing system for enhanced efficiency and monitoring capability
US8170044B2 (en) 2002-05-06 2012-05-01 Foundry Networks, Llc Pipeline method and system for switching packets
US8718051B2 (en) 2003-05-15 2014-05-06 Foundry Networks, Llc System and method for high speed packet transmission
US9461940B2 (en) 2003-05-15 2016-10-04 Foundry Networks, Llc System and method for high speed packet transmission
US8811390B2 (en) 2003-05-15 2014-08-19 Foundry Networks, Llc System and method for high speed packet transmission
US20040264374A1 (en) * 2003-06-27 2004-12-30 Broadcom Corporation Equal and weighted cost multipath load balancing in a network device
US7697432B2 (en) * 2003-06-27 2010-04-13 Broadcom Corporation Equal and weighted cost multipath load balancing in a network device
US20110110237A1 (en) * 2004-03-26 2011-05-12 Foundry Networks, Llc Method and Apparatus for Aggregating Input Data Streams
US9338100B2 (en) 2004-03-26 2016-05-10 Foundry Networks, Llc Method and apparatus for aggregating input data streams
US8493988B2 (en) 2004-03-26 2013-07-23 Foundry Networks, Llc Method and apparatus for aggregating input data streams
US8730961B1 (en) 2004-04-26 2014-05-20 Foundry Networks, Llc System and method for optimizing router lookup
US9378005B2 (en) 2005-12-28 2016-06-28 Foundry Networks, Llc Hitless software upgrades
US8448162B2 (en) 2005-12-28 2013-05-21 Foundry Networks, Llc Hitless software upgrades
US9030943B2 (en) 2006-11-22 2015-05-12 Foundry Networks, Llc Recovering from failures without impact on data traffic in a shared bus architecture
US8238255B2 (en) 2006-11-22 2012-08-07 Foundry Networks, Llc Recovering from failures without impact on data traffic in a shared bus architecture
US8395996B2 (en) 2007-01-11 2013-03-12 Foundry Networks, Llc Techniques for processing incoming failure detection protocol packets
US9112780B2 (en) 2007-01-11 2015-08-18 Foundry Networks, Llc Techniques for processing incoming failure detection protocol packets
US8155011B2 (en) 2007-01-11 2012-04-10 Foundry Networks, Llc Techniques for using dual memory structures for processing failure detection protocol packets
US20080240740A1 (en) * 2007-03-29 2008-10-02 Oki Data Corporation Image processing apparatus and image processing system
US8271859B2 (en) 2007-07-18 2012-09-18 Foundry Networks Llc Segmented CRC design in high speed networks
US20090282148A1 (en) * 2007-07-18 2009-11-12 Foundry Networks, Inc. Segmented crc design in high speed networks
US8037399B2 (en) 2007-07-18 2011-10-11 Foundry Networks, Llc Techniques for segmented CRC design in high speed networks
US8234390B2 (en) 2007-07-25 2012-07-31 Cisco Technology, Inc. Register clustering in a SIP-based network
US7970916B2 (en) * 2007-07-25 2011-06-28 Cisco Technology, Inc. Register clustering in a sip-based network
US20110219133A1 (en) * 2007-07-25 2011-09-08 Cisco Technology, Inc. A California Corporation Register clustering in a sip-based network
US20090031032A1 (en) * 2007-07-25 2009-01-29 Cisco Technology, Inc. Register clustering in a sip-based network
US8149839B1 (en) * 2007-09-26 2012-04-03 Foundry Networks, Llc Selection of trunk ports and paths using rotation
US8509236B2 (en) * 2007-09-26 2013-08-13 Foundry Networks, Llc Techniques for selecting paths and/or trunk ports for forwarding traffic flows
JP2014017842A (en) * 2007-12-26 2014-01-30 Nortel Networks Ltd Tie-breaking in shortest path determination
US8090901B2 (en) 2009-05-14 2012-01-03 Brocade Communications Systems, Inc. TCAM management approach that minimize movements
US20100293327A1 (en) * 2009-05-14 2010-11-18 Brocade Communications Systems, Inc. TCAM Management Approach That Minimize Movements
US8599850B2 (en) 2009-09-21 2013-12-03 Brocade Communications Systems, Inc. Provisioning single or multistage networks using ethernet service instances (ESIs)
US9166818B2 (en) 2009-09-21 2015-10-20 Brocade Communications Systems, Inc. Provisioning single or multistage networks using ethernet service instances (ESIs)
US20110069711A1 (en) * 2009-09-21 2011-03-24 Brocade Communications Systems, Inc. PROVISIONING SINGLE OR MULTISTAGE NETWORKS USING ETHERNET SERVICE INSTANCES (ESIs)
US20130107717A1 (en) * 2010-07-02 2013-05-02 Huawei Technologies Co., Ltd. Method, apparatus, and system for sharing network traffic
US20210194800A1 (en) * 2016-02-08 2021-06-24 Barefoot Networks, Inc. Resilient hashing for forwarding packets
US10313231B1 (en) * 2016-02-08 2019-06-04 Barefoot Networks, Inc. Resilient hashing for forwarding packets
US10063407B1 (en) 2016-02-08 2018-08-28 Barefoot Networks, Inc. Identifying and marking failed egress links in data plane
US11310099B2 (en) 2016-02-08 2022-04-19 Barefoot Networks, Inc. Identifying and marking failed egress links in data plane
US11811902B2 (en) * 2016-02-08 2023-11-07 Barefoot Networks, Inc. Resilient hashing for forwarding packets
US10084687B1 (en) 2016-11-17 2018-09-25 Barefoot Networks, Inc. Weighted-cost multi-pathing using range lookups
US10791046B2 (en) 2016-11-17 2020-09-29 Barefoot Networks, Inc. Weighted-cost multi-pathing using range lookups
US10237206B1 (en) 2017-03-05 2019-03-19 Barefoot Networks, Inc. Equal cost multiple path group failover for multicast
US10404619B1 (en) 2017-03-05 2019-09-03 Barefoot Networks, Inc. Link aggregation group failover for multicast
US10728173B1 (en) 2017-03-05 2020-07-28 Barefoot Networks, Inc. Equal cost multiple path group failover for multicast
US11271869B1 (en) 2017-03-05 2022-03-08 Barefoot Networks, Inc. Link aggregation group failover for multicast
US11716291B1 (en) 2017-03-05 2023-08-01 Barefoot Networks, Inc. Link aggregation group failover for multicast
CN113542131A (en) * 2021-05-25 2021-10-22 新华三信息安全技术有限公司 Message forwarding method and device

Also Published As

Publication number Publication date
EP1482695A2 (en) 2004-12-01
EP1482695A3 (en) 2006-02-08
EP1482695B1 (en) 2017-12-06
US7346706B2 (en) 2008-03-18

Similar Documents

Publication Publication Date Title
US7346706B2 (en) Equivalent multiple path traffic distribution in communications networks
EP1898572A1 (en) Systems, devices and methods for network routing
US9246810B2 (en) Hash-based load balancing with per-hop seeding
US6980521B1 (en) Method and apparatus for per session load balancing with improved load sharing in a packet switched network
US8687621B2 (en) Dynamically right-sizing prefixes for network and application performance
US8014291B2 (en) Relaxed constrained shortest path first (R-CSPF)
JP2018512099A5 (en)
US8995446B2 (en) Efficient generation of VPN-based BGP updates
US8085659B2 (en) Method and switch for routing data packets in interconnection networks
CA2773400A1 (en) Method and apparatus for selecting between multiple equal cost paths
Altın et al. OSPF routing with optimal oblivious performance ratio under polyhedral demand uncertainty
Tuncer et al. Flexible traffic splitting in OpenFlow networks
US8948177B2 (en) Policy based routing
Foerster et al. Grafting arborescences for extra resilience of fast rerouting schemes
Owens et al. Explicit routing in software-defined networking (ersdn): Addressing controller scalability
Schneider et al. A simulation study of the OSPF-OMP routing algorithm
Li et al. Bandwidth-efficient network monitoring algorithms based on segment routing
Avallone et al. A DAG-based forwarding paradigm for large scale software defined networks
US20180262473A1 (en) Encrypted data packet
Papagianni et al. Towards reduced-state service chaining with source routing
Roughan et al. GATEway: symbiotic inter-domain traffic engineering
US9992110B2 (en) Dynamic switching control over multiple internet services provided for home networks
El Mougy et al. Preserving privacy in wireless sensor networks using onion routing
Wójcik et al. Loop resolution mechanism for flow-aware multi-topology adaptive routing
Camarero et al. Polarized routing: an efficient and versatile algorithm for large direct networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: ALCATEL, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:REZAAIFAR, EHSAN;BASSIN, YURI;REEL/FRAME:014036/0593

Effective date: 20030502

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:LUCENT, ALCATEL;REEL/FRAME:029821/0001

Effective date: 20130130

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:029821/0001

Effective date: 20130130

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033868/0001

Effective date: 20140819

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001

Effective date: 20170912

Owner name: NOKIA USA INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001

Effective date: 20170913

Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001

Effective date: 20170913

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:ALCATEL;REEL/FRAME:048329/0784

Effective date: 20061130

Owner name: NOKIA US HOLDINGS INC., NEW JERSEY

Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682

Effective date: 20181220

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

AS Assignment

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001

Effective date: 20211129

AS Assignment

Owner name: BARINGS FINANCE LLC, AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:RPX CORPORATION;REEL/FRAME:063429/0001

Effective date: 20220107